Optimal dismantling of criminal networks. A perspective from the mathematical and computational modeling

This work deals with the study and comparison of different strategies for the optimal dismantling of delinquent networks, which aim to optimally identify the most relevant individuals in the network. The strategy of greater complexity that we have studied here, is based on the Katz-Bonacich centrali...

Full description

Autores:
Sarmiento Bahoque, Tomas Angel
Cantillo Palacio, John Fredys
Realpe Gómez, John Eduardo
Montoya Martínez, Javier Antonio
Tipo de recurso:
Fecha de publicación:
2016
Institución:
Universidad EAFIT
Repositorio:
Repositorio EAFIT
Idioma:
spa
OAI Identifier:
oai:repository.eafit.edu.co:10784/11293
Acceso en línea:
http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/3293
http://hdl.handle.net/10784/11293
Palabra clave:
Complex systems
computational modeling
network models
game theory
delinquent networks
statistical mechanics
ICT
Sistemas complejos
modelado computacional
modelos en redes
teoría de juegos
redes delincuenciales
mecánica estadística
TICs
Rights
License
Copyright (c) 2016 Ingeniería y Ciencia | ing.cienc.
id REPOEAFIT2_873cafb9da89e7d1dc2afe20cb5b5143
oai_identifier_str oai:repository.eafit.edu.co:10784/11293
network_acronym_str REPOEAFIT2
network_name_str Repositorio EAFIT
repository_id_str
dc.title.eng.fl_str_mv Optimal dismantling of criminal networks. A perspective from the mathematical and computational modeling
dc.title.spa.fl_str_mv Desmantelamiento óptimo de redes delincuenciales. Una perspectiva desde el modelado matemático y computacional
title Optimal dismantling of criminal networks. A perspective from the mathematical and computational modeling
spellingShingle Optimal dismantling of criminal networks. A perspective from the mathematical and computational modeling
Complex systems
computational modeling
network models
game theory
delinquent networks
statistical mechanics
ICT
Sistemas complejos
modelado computacional
modelos en redes
teoría de juegos
redes delincuenciales
mecánica estadística
TICs
title_short Optimal dismantling of criminal networks. A perspective from the mathematical and computational modeling
title_full Optimal dismantling of criminal networks. A perspective from the mathematical and computational modeling
title_fullStr Optimal dismantling of criminal networks. A perspective from the mathematical and computational modeling
title_full_unstemmed Optimal dismantling of criminal networks. A perspective from the mathematical and computational modeling
title_sort Optimal dismantling of criminal networks. A perspective from the mathematical and computational modeling
dc.creator.fl_str_mv Sarmiento Bahoque, Tomas Angel
Cantillo Palacio, John Fredys
Realpe Gómez, John Eduardo
Montoya Martínez, Javier Antonio
dc.contributor.author.none.fl_str_mv Sarmiento Bahoque, Tomas Angel
Cantillo Palacio, John Fredys
Realpe Gómez, John Eduardo
Montoya Martínez, Javier Antonio
dc.subject.keyword.eng.fl_str_mv Complex systems
computational modeling
network models
game theory
delinquent networks
statistical mechanics
ICT
topic Complex systems
computational modeling
network models
game theory
delinquent networks
statistical mechanics
ICT
Sistemas complejos
modelado computacional
modelos en redes
teoría de juegos
redes delincuenciales
mecánica estadística
TICs
dc.subject.keyword.spa.fl_str_mv Sistemas complejos
modelado computacional
modelos en redes
teoría de juegos
redes delincuenciales
mecánica estadística
TICs
description This work deals with the study and comparison of different strategies for the optimal dismantling of delinquent networks, which aim to optimally identify the most relevant individuals in the network. The strategy of greater complexity that we have studied here, is based on the Katz-Bonacich centrality criteria as a measure of influence of the individuals in the network. This results in an NP-hard type of problem, therefore, in order to apply that criteria, we must use heuristic methods which allow us to find approximate solutions. In particular, the methods used in this work are the Monte Carlo and greedy algorithms. We compared their performance against less sophisticated strategies and we were able to find that these algorithms perform relatively better, which contributes to improve our understanding of these approaches. In addition, we discuss a model that was recently introduced, which justifies the use of Katz-Bonacich centrality from the point of view of game theory on networks.
publishDate 2016
dc.date.issued.none.fl_str_mv 2016-11-22
dc.date.available.none.fl_str_mv 2017-04-03T16:10:27Z
dc.date.accessioned.none.fl_str_mv 2017-04-03T16:10:27Z
dc.date.none.fl_str_mv 2016-11-11
dc.type.eng.fl_str_mv info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
article
publishedVersion
dc.type.coarversion.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_6501
http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.local.spa.fl_str_mv Artículo
status_str publishedVersion
dc.identifier.issn.none.fl_str_mv 2256-4314
1794–9165
dc.identifier.uri.none.fl_str_mv http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/3293
http://hdl.handle.net/10784/11293
dc.identifier.doi.none.fl_str_mv 10.17230/ingciencia.12.24.4
identifier_str_mv 2256-4314
1794–9165
10.17230/ingciencia.12.24.4
url http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/3293
http://hdl.handle.net/10784/11293
dc.language.iso.none.fl_str_mv spa
language spa
dc.relation.isversionof.none.fl_str_mv http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/3293
dc.rights.spa.fl_str_mv Copyright (c) 2016 Ingeniería y Ciencia | ing.cienc.
http://creativecommons.org/licenses/by/4.0
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.local.spa.fl_str_mv Acceso abierto
rights_invalid_str_mv Copyright (c) 2016 Ingeniería y Ciencia | ing.cienc.
http://creativecommons.org/licenses/by/4.0
Acceso abierto
http://purl.org/coar/access_right/c_abf2
dc.format.none.fl_str_mv application/pdf
dc.publisher.spa.fl_str_mv Universidad EAFIT
dc.source.none.fl_str_mv instname:Universidad EAFIT
reponame:Repositorio Institucional Universidad EAFIT
dc.source.eng.fl_str_mv Ingeniería y Ciencia | ing.cienc.; Vol 12, No 24 (2016); 83-103
dc.source.spa.fl_str_mv Ingeniería y Ciencia | ing.cienc.; Vol 12, No 24 (2016); 83-103
instname_str Universidad EAFIT
institution Universidad EAFIT
reponame_str Repositorio Institucional Universidad EAFIT
collection Repositorio Institucional Universidad EAFIT
bitstream.url.fl_str_mv https://repository.eafit.edu.co/bitstreams/0499c4d0-fd2b-41d8-b112-b0fc3c47988c/download
https://repository.eafit.edu.co/bitstreams/46f66c77-5649-4a81-b1d8-19583fd206e4/download
https://repository.eafit.edu.co/bitstreams/abab77a8-1214-4941-944c-7497593d3485/download
bitstream.checksum.fl_str_mv 260ef3f593260a377e41a42014d04121
209e5406296ed7ffa03a1364d84c9276
da9b21a5c7e00c7f1127cef8e97035e0
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional Universidad EAFIT
repository.mail.fl_str_mv repositorio@eafit.edu.co
_version_ 1814110591493603328
spelling 2016-11-112017-04-03T16:10:27Z2016-11-222017-04-03T16:10:27Z2256-43141794–9165http://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/3293http://hdl.handle.net/10784/1129310.17230/ingciencia.12.24.4This work deals with the study and comparison of different strategies for the optimal dismantling of delinquent networks, which aim to optimally identify the most relevant individuals in the network. The strategy of greater complexity that we have studied here, is based on the Katz-Bonacich centrality criteria as a measure of influence of the individuals in the network. This results in an NP-hard type of problem, therefore, in order to apply that criteria, we must use heuristic methods which allow us to find approximate solutions. In particular, the methods used in this work are the Monte Carlo and greedy algorithms. We compared their performance against less sophisticated strategies and we were able to find that these algorithms perform relatively better, which contributes to improve our understanding of these approaches. In addition, we discuss a model that was recently introduced, which justifies the use of Katz-Bonacich centrality from the point of view of game theory on networks.El objetivo de este trabajo es estudiar y comparar diferentes estrategias para el desmantelamiento óptimo de redes delincuenciales, las cuales están representadas en algoritmos que permiten la identificación óptima de los individuos claves en la red. La estrategia de mayor complejidad se basa en la métrica de centralidad de Katz-Bonacich como medida de influencia en la red, y da lugar a un problema NP-difícil por lo que se debe recurrir a métodos heurísticos para encontrar soluciones aproximadas. Aquí se desarrolla un algoritmo basado en el método Monte Carlo y se compara con un método basado en algoritmos voraces introducido recientemente en la literatura. En este trabajo se compara además el desempeño de éstos con estrategias menos sofisticadas y se proporciona evidencia que dichos algoritmos se desempeñan relativamente bien, contribuyendo así a proporcionar un mejor entendimiento de éstos. Se discute además un modelo introducido recientemente que justifica el uso de la centralidad de Katz-Bonacich desde el punto de vista de la teoría de juegos sobre redes.application/pdfspaUniversidad EAFIThttp://publicaciones.eafit.edu.co/index.php/ingciencia/article/view/3293Copyright (c) 2016 Ingeniería y Ciencia | ing.cienc.http://creativecommons.org/licenses/by/4.0Acceso abiertohttp://purl.org/coar/access_right/c_abf2instname:Universidad EAFITreponame:Repositorio Institucional Universidad EAFITIngeniería y Ciencia | ing.cienc.; Vol 12, No 24 (2016); 83-103Ingeniería y Ciencia | ing.cienc.; Vol 12, No 24 (2016); 83-103Optimal dismantling of criminal networks. A perspective from the mathematical and computational modelingDesmantelamiento óptimo de redes delincuenciales. Una perspectiva desde el modelado matemático y computacionalinfo:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionarticlepublishedVersionArtículohttp://purl.org/coar/version/c_970fb48d4fbd8a85http://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1Complex systemscomputational modelingnetwork modelsgame theorydelinquent networksstatistical mechanicsICTSistemas complejosmodelado computacionalmodelos en redesteoría de juegosredes delincuencialesmecánica estadísticaTICsSarmiento Bahoque, Tomas AngelCantillo Palacio, John FredysRealpe Gómez, John EduardoMontoya Martínez, Javier AntonioIngeniería y Ciencia122483103ing.ciencORIGINALdocument (38).pdfdocument (38).pdfTexto completo PDFapplication/pdf660337https://repository.eafit.edu.co/bitstreams/0499c4d0-fd2b-41d8-b112-b0fc3c47988c/download260ef3f593260a377e41a42014d04121MD51articulo.htmlarticulo.htmlTexto completo HTMLtext/html374https://repository.eafit.edu.co/bitstreams/46f66c77-5649-4a81-b1d8-19583fd206e4/download209e5406296ed7ffa03a1364d84c9276MD53THUMBNAILminaitura-ig_Mesa de trabajo 1.jpgminaitura-ig_Mesa de trabajo 1.jpgimage/jpeg265796https://repository.eafit.edu.co/bitstreams/abab77a8-1214-4941-944c-7497593d3485/downloadda9b21a5c7e00c7f1127cef8e97035e0MD5210784/11293oai:repository.eafit.edu.co:10784/112932020-03-01 17:51:12.753open.accesshttps://repository.eafit.edu.coRepositorio Institucional Universidad EAFITrepositorio@eafit.edu.co